Provide the access for required application (e.g. here access has been provided to RDP application 192.168.1.14 which we just created in step 6)

Check the Radius box to allow radius users to login to SSL VPN

Click Ok to save the configuration.

Radius configuration on Windows 2008 R2 server:

Step 1:

Login to Windows 2008 R2 server and Go to Server Manager

Create a user account and password by clicking Local Users and Groups>>Users. Here we will be using existing user “administrator”

Navigate to Radius Clients under Server Manager >> right click the mouse button to select New >> Enter the details like Friendly name, IP address of the Vigor 2925, Shared secret. This will be same as shared secret typed in router under step 2 of section 1

Click on Advanced tab >> Here we will use default values as shown below:

Step 2

Configure Connection Request Policies under Service Manager.

If you have default policy “Use Windows authentication for all users” configured under connection request policies then you can skip this step. Else you need to configure connection request policy.

Right click Policies >> Connection Request Policies >> Add New

Enter policy name

Select the criteria under conditions tab. We will select user criteria under Network policy and will allow users to log in to all the time as described below:

Remaining values will be default under various tabs under settings as shown below:

Step 3

Configure Network Policies under Service Manager

Right click Network Policies >> Add New

Enter policy name and other details as shown below:

Choose the condition. Here you can select the user group to whom you want to give access for SSL VPN

E.g. here we have given access to two user groups - vpn and administrators. Hence any user who is member of these groups will get access for SSL VPN

Select Authentication Method as Unencrypted

Remaining setting will be default as shown below:

Check SSL VPN authentication

Go to web browser of the laptop from which you want to access SSL VPN.